Sciweavers

955 search results - page 138 / 191
» Model Checking Operator Procedures
Sort
View
ATAL
2001
Springer
15 years 6 months ago
Commitment Machines
We develop an approach in which we model communication protocols via commitment machines. Commitment machines supply a content to protocol states and actions in terms of the social...
Pinar Yolum, Munindar P. Singh
110
Voted
ICPR
2000
IEEE
15 years 6 months ago
Generalized Non-Reducible Descriptors
This paper provides a generalization of non-reducible descriptors by extending the concept of distance between patterns of di erent classes. Generalized non-reducible descriptors ...
Ventzeslav Valev, Bülent Sankur, Petia Radeva
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 6 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
132
Voted
ICANN
2009
Springer
15 years 6 months ago
Profiling of Mass Spectrometry Data for Ovarian Cancer Detection Using Negative Correlation Learning
This paper proposes a novel Mass Spectrometry data profiling method for ovarian cancer detection based on negative correlation learning (NCL). A modified Smoothed Nonlinear Energy ...
Shan He, Huanhuan Chen, Xiaoli Li, Xin Yao
3DPVT
2006
IEEE
187views Visualization» more  3DPVT 2006»
15 years 6 months ago
Linking Feature Lines on 3D Triangle Meshes with Artificial Potential Fields
We propose artificial potential fields as a support theory for a feature linking algorithm. This algorithm operates on 3D triangle meshes derived from multiple range scans of an o...
David L. Page, Andreas Koschan, Mongi A. Abidi